Kubernetes Pentest Methodology Part 2

Originally published at: https://www.cyberark.com/threat-research-blog/kubernetes-pentest-methodology-part-2/

Attacking the Cluster Remotely In our previous blog post “Kubernetes Pentest Methodology Part 1”, we wrote about the risks that might be created by misconfiguring the Kubernetes RBAC. Also, we demonstrated the attack vectors that could lead to privilege escalation. In this part, we will focus on the attack vectors from the perspectives of a…